Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:27768
HistoryMar 18, 2012 - 12:00 a.m.

ESA-2012-012: EMC Documentum eRoom Multiple Vulnerabilities

2012-03-1800:00:00
vulners.com
49

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2012-012: EMC Documentum eRoom multiple vulnerabilities

EMC Identifier: ESA-2012-012

CVE Identifiers: CVE-2012-0398, CVE-2012-0404

Severity Rating: CVE-2012-0398 : CVSS Base Score is 5.8
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
CVE-2012-0404 : CVSS Base Score is 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

Affected products:
EMC Documentum eRoom versions prior 7.4.4

Vulnerability Summary:
EMC Documentum eRoom contains vulnerabilities that can be potentially
exploited by malicious users to conduct session replay and cross-site
scripting attacks.

Vulnerability Details:
Two vulnerabilities have been identified in EMC Documentum eRoom, which can
be potentially exploited by malicious users to conduct session replay and
cross-site scripting attacks.

1) The eRoom session cookies are set/validated insecurely which may lead to
session hijacking and/or session replay (CVE-2012-0398). CVSS Base Score is
5.8 (AV:A/AC:L/Au:N/C:P/I:P/A:P)
2) eRoom application is vulnerable to DOM-based cross-site-scripting
attacks (CVE-2012-0404). CVSS Base Score is 5.8
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
EMC is also providing additional instructions to customers to further
protect their eRoom environment from cross-site scripting attacks. See KB
article esg127683 available from Powerlink
for more details.

Resolution:
The following EMC Documentum eRoom products contain resolution to these
issues:

eRoom version 7.4.4

EMC strongly recommends all customers upgrade to eRoom 7.4.4 at the
earliest opportunity.
Link to remedies:

Registered EMC Powerlink customers can download software from Powerlink.
For EMC Documentum eRoom Software, navigate in Powerlink to Home > Support
> Software Downloads and Licensing > Downloads D > Documentum eRoom. Also,
follow the instructions in esg127683 to
further harden their eRoom environment.

Credit:

EMC would like to thank SEC Consult
(https://www.sec-consult.com/en/index.html)for providing security and
Documentum eRoom consulting for this release.

Read and use the information in this EMC Security Advisory to assist in
avoiding any situation that might arise from the problems described herein.
If you have any questions regarding this
product alert, contact EMC Software Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution
emc218831. EMC recommends all customers take into account both the base
score and any relevant temporal and
environmental scores which may impact the potential severity associated
with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to
the attention of users of the affected EMC products, important security
information. EMC recommends that all users
determine the applicability of this information to their individual
situations and take appropriate action. The information set forth herein is
provided "as is" without warranty of any
kind. EMC disclaims all warranties, either express or implied, including
the warranties of merchantability, fitness for a particular purpose, title
and non-infringement. In no event, shall
EMC or its suppliers, be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if EMC or its suppliers
have been advised of the possibility of such damages. Some states do not
allow the exclusion or limitation of liability for consequential or
incidental damages, so the foregoing limitation
may not apply.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.12.0 (Build 1035)
Charset: utf-8

wj8DBQFPX1Gdtjd2rKp+ALwRAnCGAKCozu6ocLroP3gd3c8tOfgcjQ3E1wCg0QWd
c6jhOGCXA50I3RlipzWM3cw=
=bbZp
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:27768